Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
bf4d320376ceacd395a74d50d96e96e2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf4d320376ceacd395a74d50d96e96e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf4d320376ceacd395a74d50d96e96e2_JaffaCakes118.html
-
Size
139KB
-
MD5
bf4d320376ceacd395a74d50d96e96e2
-
SHA1
480e2e586fab7fb2d343c6be5c3b914b62c3c0cf
-
SHA256
51ef643aaab1ca3184bd5d123420d4f88f6d25720f699779b6f2e6afe3846525
-
SHA512
a07b284e4138dcdc213ecf0faae730d9a50fa23059c4670766b018e6631d7f62e6932dcb00069c059c863dd4a2fdd46a8eb2df07fc7c79e1a257c4239970af58
-
SSDEEP
3072:SAgOoURG+dyfkMY+BES09JXAnyrZalI+YQ:SrtsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED7C5721-6252-11EF-A0AD-C26A93CEF43F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000f5dc57efe9fcb5f272815515c9a1b9a8e2cbb89c591a371d4f10b98d1f30784a000000000e80000000020000200000004fef719a51c8b854a9c1b9fe5ed4b52b03b4a3eb4ad097f390551bd142744b8920000000d25284f17f366b7e864ca8db721b074c40ce643eb5343814471fbbe50bd2555b4000000073a8e4888b14e7e5b3692d2de607eb103d271f8df0a28ec1bfedebc7fd568d34117e3b9f765bbff750f480284018b1080d91ac1efb21a44f791ac2a364d2c353 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430691246" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f5a10360f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2824 2172 iexplore.exe 30 PID 2172 wrote to memory of 2824 2172 iexplore.exe 30 PID 2172 wrote to memory of 2824 2172 iexplore.exe 30 PID 2172 wrote to memory of 2824 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf4d320376ceacd395a74d50d96e96e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaeeca981f4e5e1afa31c595ed360ed6
SHA1451970a3588a109ab5099875d1ae1580410ff739
SHA256f60a037da53719c1961801c9c751e7a717c0215cd7b669ba8531c56f34493efa
SHA5129e35777c3a2e36c2cb5b3828e861dac7a9a48c0ac393a1efe0e6913fa1e58d77dd7b69ea46228297703c857046331c29cc4ba924ca02782a549f00c76a2fda0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a746e5909c1590602224275ad57256
SHA19f339967fd0c26dcde7daa5c5b09958040434b60
SHA256b7644e792b705706bddde5a22e0009c5704b9d2e27fdbeeaf4ca4bd8c683bd09
SHA5128e7299b698e8ee5f0be4864ae35abe0288836991975228068734c307180a9e29810fb1ee42b8ae514807acf7113559b4a092ff9c3881021b314821b8d2124916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570814ef8a39fcbceff853e91e9f19865
SHA182fa46879729f1506c13b5b453aa135fe38cd18f
SHA256e5fc701932c844f942af914b1a3aba8833cc7f37598a247241505d72abeb2c02
SHA512200688affe66e378036bb0f85d36c83939a756354cc2a05abb2f3f4884df65795c53f397f76c7f043b49ba33e25dccb65639483c5cae0c0ffa32eb8e1314a87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50131bfa5f4fe2adc5aa018a1342634f3
SHA1f9c5f2dd263f8e57c33411041a2fc116188d42c3
SHA25658ac387a1655eff20d785ff21eafcb3ed7ad265c80fc95083d8ac8edc57539d3
SHA5129d05042318c01018788c5472b3ce521f9614f03e42e68afeb0e0503d4a1ff76b04de720617447f33f573ba5af33e6397f28cdd6d7dfd2d971f5674709e4c6abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d195ad95797ff3c90ee4c772aad63cbc
SHA1609dc5de3ace2c6429083b19f941583e5724e89c
SHA256c5ec65b109d3af47e9df1a3498e8a43fb0fc2aed8168cb4ef15c62b161d697d6
SHA51201254fea53523c66d20f161146c84bc5558bb6aafc64c21227e41bec225ce4a7288b6c30ba60ff3b51873583af776457121c76effb9d33c643619b257712b4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867d4c34f7a7debe436cc0af2909546b
SHA157ad003acf507f77c70ee09e18ee2a5b6ecf248c
SHA25690523059e09737f6f7a2622598fc735241afc22167712a1d46e2bef14a9c9b5b
SHA5121c9978648d40ed8b08cba9ddd19a35a1a984617e6eb40d843a4fd02110e9658893fb85853822dc44894711e282d227dccd4b850e1d50b4b33c66ab7b43787f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5b229314608764c78cb3ab818be277
SHA1433524fe5a49c34926452337e819a2bb7b0f39dd
SHA256182332e553275171acd44fc3fd9b3f163e4c03a56fe6a22c2e476b89e62a5eba
SHA512b7c332110aa768bc55da5ff6257c8c97d17496bea7b65a2513d813a15f4af97fc794c9a1fb7a7bf56a36100afccb0799cd1e55d5b6ac0f62b40310fc2fb0d62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516f5afba0668e72c2b9d130b071f156
SHA16ea43f691c0ca3a68c4e0bbe9e9fc01f7badef42
SHA25682b43a5e2d9af3f4da575703fdfdb15301a69a94baa2d9ec85450a9156a0b95e
SHA512629431ec2940bf8466ec7d116c9e18ccdaee62dc21e00ade7a776f49cf7fc3b0e2b56d634c2144109fa7e777934330b26cc654f123c2bfee6e167c7d7af685b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4cdd621914af86cbcfaa2df3fde649
SHA1d6443613e5700eda5eea9e1b9fdbba48c7105139
SHA25653425be0f990055c3ebc10c810b40fd3acb777204f241897c72e36f34468cf74
SHA5125bf550e22ad1615bce391944041e1281262b3b3377a2fca6a8cb85abee67dd264526104c78a6b94476159f3144a672829728cbb36ebdd08ed87daa0359c47b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf30046b2450fd31ffbb06ddd07a7ffd
SHA18f43533d9a399cdf8bca12a6d60641bc50b3c89a
SHA2569b2b19cab3bb8e5c1a34159b6b946d8bea357afb14333cb723ca9a5a4be5883b
SHA5120e0ced1b9a5b11113f8aef312505ac8528ba976a125ccb0cc841b5819ababd89962a99b6d8a6b2eb626fb3fbd70cf4666779f82f61bdd3a8b6d4222c271aa5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3930d03707fff5a3c525e7e41f022fb
SHA173763c85cb505d9436b4f341a999b4a215dfa26e
SHA25697dc3a7d75cb97be8bdacfecbb06fc5b62fa11f5ca664ff3c23e07f81ff5b92c
SHA512eba61fd84820de06452a06eed48be17191d27866ab706ac4b5ca40bb6788997da30312833dd76eda7304bcb5baaec1af06a18e0b7787c776633bdae84e011f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0b4aa91106fe621ee485eebb94c891
SHA11f4927b483aec698fc85ea46f83cd7212b76995c
SHA2568c50c9316af2e1dc602870748141388aa42565757af1590376dffda23c77e7be
SHA512eca1ffbdaa9f3abbe7311a30555ee378c141b163a2c249e1e750708398155be4ef0b4f7d6563a2016a31bdb5f94006881b82b56db802441c640fe128cfb41ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57914e81708c97e204ed723992c5a8224
SHA12e282243a143ffdb6a63bed0e9f300b7683a1392
SHA25647684f79ab0a3f051af28c77a327fa3886032fead227b731b39727026648d9d3
SHA512c68bc1c53d591390325cc04d815b587e534e6239cbaeacd308c2c3ea93342f64ca2ff44ed79d804512e5001e187f5b24f3274af4faf0fa15205c9e10c3a14530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538570686489eb4f5f0aab28eb5f66633
SHA1a32e0bd8414b04f1dde3a55bb08fa7fc33e0ae66
SHA256f32beb3e8edef99953a990195ce73170087930d3a83fff4b66f9144a302b223c
SHA512ec594d8e788c99f51bf03b90b65ba20f7da3df279df5625e128daa71b534dffd15901a09ef52309d414f2866fca9cda7ea583eb1e68017e81d55f447d4432553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad73a36284de8177c1e3abf2d45fc23
SHA1866ce63d5f0f8e76c71284290e293e06d39fe4dc
SHA256b7ac33a6dab80948b6200a0e4efffc99c9c291449017f5dee54072d902602f2e
SHA5128b7bce6cb250909a21d7e2e3ab0aab7fc833b5d06e2d7324214aec6a81cc2c78de81f517a15720cd362e8485e7dce501df7f12de94100f4a6df9fb1d9bb5115b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9956164e558f6b91b56068f0a05b6e
SHA165b572e3f4725511e21c30ada73ff03a89830d66
SHA25628412b0d1314c86f730e43b31a011b8826664b22c03365a770e75478e91f63f1
SHA5125fab1a5f4fce7e7b94718b2401be0368d254b2139f4aa60b33020a6ed75d831d1feba4b956d983ed9f3d7c406666587ba44044c5fce3f2217b9fdb5c5a82948f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2cce42d408ecc9fd47ad0da2e616b0
SHA19258ccfd6f068c0cf94cd32612a3969fe0e0c44f
SHA256932933aff5672f06f7b773c496e1a6ddd2137d8496c1841d7650428a3524986a
SHA512cd9f819c50991676655a73e49755270570b4f8e5c50a6baac387f752bf1e6e97865eac8fc68496471dda1067ebb3878168ed2e23f108e54af703d5c9d9aebfad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528008b3deacaf4de390ee9098e8fe451
SHA17d6a1a61bb45b81c329fcecdf7ada11cd3c0fd60
SHA2567014719fe6e08fbc30c276a812d63d51a5856a56b8e3f681cec17c624541ed96
SHA512a36a388d39f6a93ac8244eb25511944f5ed2b6513342facaf5491c73da257a495622756788ca7c77a24173d2df81f9f7b258f7694cf661e74a4adf165240a3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a1e55102be5470596fb8a6c1232c3f
SHA1471c0b0b55f7b9c35bd82b1930685102df80611f
SHA256ade5cd6d13a332b4b05607cceea0b9b360e514dd4872b90c495295bbbc2d4a34
SHA512fee0454e9fd07f9f9accd394fd3782c934bfceaed1f703c44eab9d563e197eecbaa09280216bb7643c9d24c5d507d3d913ee76d12bf773d269134f48e67b7baa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b